Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

149 résultats
Image document

Stéganographie naturelle pour images JPEG

Théo Taburet , Patrick Bas , Wadih Sawaya , Jessica Fridrich
GRETSI, Aug 2019, Lille, France
Communication dans un congrès hal-02165880v1
Image document

Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization

Anh Thu Phan Ho , Bao An Hoang Mai , Wadih Sawaya , Patrick Bas
EURASIP Journal on Information Security, 2014, pp.10.1186/1687-417X-2014-9. ⟨10.1186/1687-417X-2014-9⟩
Article dans une revue hal-01056699v1
Image document

IMAGE MODEL AND PRINTED DOCUMENT AUTHENTICATION: A THEORETICAL ANALYSIS

Bao An Hoang Mai , Wadih Sawaya , Patrick Bas
IEEE International Conference on Image Processing, Oct 2014, France. pp.IEEE ICIP
Communication dans un congrès hal-01056706v1
Image document

A New Measure of Watermarking Security: The Effective Key Length

Patrick Bas , Teddy Furon
IEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue hal-00836404v1
Image document

Are 128 Bits Long Keys Possible in Watermarking?

Patrick Bas , Teddy Furon
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès hal-01540890v1

TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization

Yoan Miche , Mark van Heeswijk , Patrick Bas , Amaury Lendasse , Olli Simula
Neurocomputing, 2011, 74 (16), pp.2413-2421. ⟨10.1016/j.neucom.2010.12.042⟩
Article dans une revue istex hal-00648069v1
Image document

Fooling an Automatic Image Quality Estimator

Benoit Bonnet , Teddy Furon , Patrick Bas
MediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès hal-03132891v1
Image document

Actes de la conférence CAID 2020

François de Vieilleville , Stéphane May , Adrien Lagrange , A Dupuis , Rosa Ruiloba , et al.
2021
Proceedings/Recueil des communications hal-03206297v1

A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers

Patrick Bas
Information Hiding Workshop, 2005, Barcelonna, Spain
Communication dans un congrès hal-00079344v1
Image document

Self-similarity based image watermarking

Patrick Bas , Jean-Marc Chassery , Franck Davoine
EUSIPCO, Oct 1998, Rhodos, Greece. pp.2277-2280
Communication dans un congrès hal-00166545v1

Color Image Watermarking Using Quaternion Fourier Transform

Patrick Bas , Nicolas Le Bihan , J.-M. Chassery
ICASSP, Sep 2003, Hong Kong SAR China. pp.CD-rom
Communication dans un congrès hal-00166554v1
Image document

Practical Key Length of Watermarking Systems

Patrick Bas , Teddy Furon , François Cayre
ICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès hal-00686813v1

Steganalysis: Detection of Hidden Data in Multimedia Content

Rémi Cogranne , Marc Chaumont , Patrick Bas
Multimedia Security 1: Authentication and Data Hiding, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. ⟨10.1002/9781119901808.ch8⟩
Chapitre d'ouvrage lirmm-03815641v1
Image document

Moving Steganography and Steganalysis from the Laboratory into the Real World

Andrew Ker , Patrick Bas , Rainer Böhme , Rémi Cogranne , Scott Craver , et al.
ACM IH-MMSEC 2013, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06
Communication dans un congrès hal-00836407v1
Image document

Natural Steganography in JPEG Domain With a Linear Development Pipeline

Théo Taburet , Patrick Bas , Wadih Sawaya , Jessica Fridrich
IEEE Transactions on Information Forensics and Security, 2020, 16, pp.173-186. ⟨10.1109/TIFS.2020.3007354⟩
Article dans une revue hal-02910206v1
Image document

Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

Tomas Pevny , Tomas Filler , Patrick Bas
Information Hiding, Jun 2010, Calgary, Canada. pp.2010
Communication dans un congrès hal-00541353v1
Image document

Side-Informed Steganography for JPEG Images by Modeling Decompressed Images

Jan Butora , Patrick Bas
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
Article dans une revue hal-04083163v1
Image document

PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESS

Slava Voloshynovskiy , Taras Holotyak , Patrick Bas
ICASSP, Mar 2016, Shanghai, China
Communication dans un congrès hal-01283068v1
Image document

Fighting the Reverse JPEG Compatibility Attack: Pick your Side

Jan Butora , Patrick Bas
The 10th ACM Workshop on Information Hiding and Multimedia Security, Jun 2022, Santa Barbara, United States. ⟨10.1145/3531536.3532955⟩
Communication dans un congrès hal-03662307v1
Image document

Soft-SCS: improving the security and robustness of the Scalar-Costa-Scheme by optimal distribution matching

Patrick Bas
INFORMATION HIDING, May 2011, Czech Republic. pp.208-222, ⟨10.1007/978-3-642-24178-9_15⟩
Communication dans un congrès hal-00648055v1
Image document

Reliable Steganalysis Using a Minimum Set of Samples and Features

Yoan Miche , Patrick Bas , Christian Jutten , Amaury Lendasse , Olli Simula
EURASIP Journal on Information Security, 2009, 2009, pp.ID 901381. ⟨10.1155/2009/901381⟩
Article dans une revue hal-00437868v1
Image document

Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme

Patrick Bas , Andreas Westfeld
ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8
Communication dans un congrès hal-00384058v1
Image document

Broken Arrows

Teddy Furon , Patrick Bas
EURASIP Journal on Information Security, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩
Article dans une revue hal-00335311v1

Natural Watermarking: a secure spread spectrum technique for WOA

Patrick Bas , François Cayre
2007, pp.8
Autre publication scientifique hal-00157965v1

Achieving subspace or key security for WOA using natural or circular watermarking

Patrick Bas , François Cayre
Proceeding of the 8th workshop on Multimedia and security, 2006, pp.80-88
Autre publication scientifique hal-00157995v1
Image document

Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent components

Patrick Bas , Jarmo Hurri
IEE Proceedings - Information Security, 2006, 153 (3), pp.127-13
Article dans une revue hal-00166596v1
Image document

Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting

Benjamin Mathon , Patrick Bas , François Cayre , Benoît Macq
WIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10), Dec 2010, Seattle, United States. pp.2010
Communication dans un congrès hal-00541383v1
Image document

Une methodologie pour la selection de variables pour la steganalyse

Yoan Miche , Patrick Bas , Amaury Lendasse , Christian Jutten , Olli Simula
Traitement du Signal, 2009, 26 (1), pp.13-30
Article dans une revue hal-00437891v1
Image document

Optimization of Natural Watermarking Using Transportation Theory

Benjamin Mathon , Patrick Bas , François Cayre , Benoît Macq
ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8
Communication dans un congrès hal-00437902v1
Image document

Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images

Benjamin Mathon , François Cayre , Patrick Bas , Benoît Macq
IEEE Transactions on Image Processing, 2014, 23 (4), pp.1694-1705. ⟨10.1109/TIP.2014.2305873⟩
Article dans une revue hal-00940754v2